Atjaunināt sīkdatņu piekrišanu

Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 1517, 2023, Proceedings 2023 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 598 pages, height x width: 235x155 mm, weight: 926 g, 51 Illustrations, black and white; XIV, 598 p. 51 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14411
  • Izdošanas datums: 01-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031491866
  • ISBN-13: 9783031491863
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 82,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 97,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 598 pages, height x width: 235x155 mm, weight: 926 g, 51 Illustrations, black and white; XIV, 598 p. 51 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14411
  • Izdošanas datums: 01-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031491866
  • ISBN-13: 9783031491863
Citas grāmatas par šo tēmu:
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.

The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as
a Defense against Model Inversion Attacks.- Privacy-preserving Medical Data
Generation using Adversarial Learning.- Balanced Privacy Budget Allocation
for Privacy-Preserving Machine Learning.- Intrusion Detection and
Systems: SIFAST: An Efficient Unix Shell Embedding Framework for
Malicious Detection.- VNGuard: Intrusion Detection System for In-Vehicle
Networks.- RLTrace: Synthesizing High-Quality System Call Traces for OS
Fuzz Testing.- Machine Learning: Loss and Likelihood Based Membership
Inference of Diffusion Models.- Symmetry Defense Against CNN Adversarial
Perturbation Attacks.- Web Security: Load-and-Act: Increasing Page Coverage
of Web Applications.- From Manifest V2 to V3: A Study on the Discoverability
of Chrome Extensions.- Mobile Security and Trusted Execution: Libra : Library
Identification in Obfuscated Android Apps.- Certificate reuse in Android
applications.- TC4SE: A High-performance Trusted Channel Mechanism for
Secure Enclave-based Trusted Execution Environments.- Post-Quantum
Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying
Network Characteristics.- Protecting Private Keys of Dilithium using Hardware
Transactional Memory.- Multiparty Computation: Mercury: Constant-Round
Protocols for Multi-Party Computation with Rationals.- Evolving Conditional
Disclosure of Secrets.- Symmetric Cryptography: Permutation-Based
Deterministic Authenticated Encryption with Minimum Memory Size.- Impossible
Differential Cryptanalysis of the FBC Block Cipher.- Fregata: Faster
Homomorphic Evaluation of AES via TFHE.- Key Management: Efficient Forward
Secrecy for TLS-PSK from Pure Symmetric Cryptography.- On the
Privacy-preserving Infrastructure for Authenticated Key Exchange.- Hybrid
Group Key Exchange with Application to Constrained Networks.- Functional and
Updatable Encryption.- Dynamic Multi-Server Updatable
Encryption.- Trace-and-Revoke Quadratic Functional
Encryption.- Function-Hiding Zero Predicate Inner Product Functional
Encryption from Pairings.- Signatures, Hashes, and Cryptanalysis: Robust
Property-Preserving Hash Meets Homomorphism.- Withdrawable Signature: How to
Call off a Signature.- An Improved BKW Algorithm for Solving LWE with Small
Secrets.